548 research outputs found

    Understanding the Genetic Makeup of Linux Device Drivers

    Get PDF
    International audienceAttempts have been made to understand driver development in terms of code clones. In this paper, we propose an alternate view, based on the metaphor of a gene. Guided by this metaphor, we study the structure of Linux 3.10 ethernet platform driver probe functions

    New Software Process Model Designed from the Basics of Evolutionary Biology and Software Evolution

    Get PDF
    The process of software development is achieved by using different software life cycle models to design, code and test the software. Process models like the water fall model, spiral model and prototyping are used by companies. Most of these models were designed for a single generation of software. In this research, methods to correct the problems in existing models are proposed based on the principles of evolution in biology and biochemistry, and an abstract model has been generated. The model is called the Infinity Model. The basic principles of biological evolution have been incorporated into the varying steps in the Infinity Model to generate an evolutionary process model. It consists of a completely new design cycle which incorporates both the creation of software and the maintenance of software. In this model, methods to correct deficiencies like resource allocation, documentation and requirement updating in the existing models have been incorporated. Several case studies of large company software and the problems they faced were studied. From the case studies several methods like requirement evolution, consolidation and architectural evolution have been incorporated into the Infinity Model.Computer Science Departmen

    Overcoming barriers and increasing independence: service robots for elderly and disabled people

    Get PDF
    This paper discusses the potential for service robots to overcome barriers and increase independence of elderly and disabled people. It includes a brief overview of the existing uses of service robots by disabled and elderly people and advances in technology which will make new uses possible and provides suggestions for some of these new applications. The paper also considers the design and other conditions to be met for user acceptance. It also discusses the complementarity of assistive service robots and personal assistance and considers the types of applications and users for which service robots are and are not suitable

    A deception based framework for the application of deceptive countermeasures in 802.11b wireless networks

    Get PDF
    The advance of 802.11 b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transmissions readily and stealthily, making organisations highly vulnerable to attack. Therefore, it is incumbent upon defending organisations to take initiative and implement proactive defences against common network attacks. Deception is an essential element of effective security that has been widely used in networks to understand attack methods and intrusions. However, little thought has been given to the type and the effectiveness of the deception. Deceptions deployed in nature, the military and in cyberspace were investigated to provide an understanding of how deception may be used in network security. Deceptive network countermeasures and attacks may then be tested on a wireless honeypot as an investigation into the effectiveness of deceptions used in network security. A structured framework, that describes the type of deception and its modus operandi, was utilised to deploy existing honeypot technologies for intrusion detection. Network countermeasures and attacks were mapped to deception types in the framework. This enabled the honeypot to appear as a realistic network and deceive targets in varying deceptive conditions. The investigation was to determine if particular deceptive countermeasures may reduce the effectiveness of particular attacks. The effectiveness of deceptions was measured, and determined by the honeypot\u27s ability to fool the attacking tools used. This was done using brute force network attacks on the wireless honeypot. The attack tools provided quantifiable forensic data from network sniffing, scans, and probes of the wireless honeypot. The aim was to deceive the attack tools into believing a wireless network existed, and contained vulnerabilities that may be further exploited by the naive attacker

    A Green Approach to a Multi-Protocol Wireless Communications Network

    Get PDF
    The goal of this project is to increase the battery life of mobile wireless devices. This is achieved by having the wireless device select between two wireless protocols, ZigBee and Wi-Fi, based on transmission energy and bandwidth requirements. Using the concepts of sensing and adaptation from cognitive radio, the system monitors the bandwidth and selects the lowest power intensive wireless protocol while still maintaining an acceptable quality of service for the desired task

    Actes des Sixièmes journées nationales du Groupement De Recherche CNRS du Génie de la Programmation et du Logiciel

    Get PDF
    National audienceCe document contient les actes des Sixièmes journées nationales du Groupement De Recherche CNRS du Génie de la Programmation et du Logiciel (GDR GPL) s'étant déroulées au CNAM à Paris du 11 au 13 juin 2014. Les contributions présentées dans ce document ont été sélectionnées par les différents groupes de travail du GDR. Il s'agit de résumés, de nouvelles versions, de posters et de démonstrations qui correspondent à des travaux qui ont déjà été validés par les comités de programmes d'autres conférences et revues et dont les droits appartiennent exclusivement à leurs auteurs

    Read, write, standardise

    Get PDF
    Peer reviewe
    • …
    corecore